Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork4.8k
Security: parse-community/parse-server
Security
SECURITY.md
If you believe you have found a security vulnerability on one of parse-community maintained packages,we encourage you to let us know right away.We will investigate all legitimate reports and do our best to quickly fix the problem.Before making a report, please review this page to understand our disclosure policy and how to communicate with us.
If you comply with the policies below when reporting a security issue to parse community,we will not initiate a lawsuit or law enforcement investigation against you in response to your report.We ask that:
- You give us reasonable time to investigate and mitigate an issue you report before making public any information about the report or sharing such information with others. This means we requestat least7 days to get back to you with an initial response andat least30 days from initial contact (made by you) to apply a patch.
- You do not interact with an individual account (which includes modifying or accessing data from the account) if the account owner has not consented to such actions.
- You make a good faith effort to avoid privacy violations and disruptions to others, including (but not limited to) destruction of data and interruption or degradation of our services.
- You do not exploit a security issue you discover for any reason. (This includes demonstrating additional risk, such as attempted compromise of sensitive company data or probing for additional issues). You do not violate any other applicable laws or regulations.
All vulnerabilities should be privately reported to us by going tohttps://report.parseplatform.org. Alternatively, you can send an email tosecurity@parseplatform.org.
- Server-Side Request Forgery (SSRF) in Instagram OAuth AdapterGHSA-3f5f-xgrj-97pf published
Dec 16, 2025 bymtrezzaHigh - Cross-Site Scripting (XSS) via password reset and email verification HTML pagesGHSA-jhgf-2h8h-ggxv published
Dec 16, 2025 bymtrezzaModerate - GitHub repository RCEGHSA-6w8g-mgvv-3fcj published
Dec 11, 2025 bymtrezzaModerate - Parse Server allows public `explain` query which may expose sensitive database performance information and schema detailsGHSA-7cx5-254x-cgrq published
Nov 8, 2025 bymtrezzaModerate - Server-Side Request Forgery (SSRF) in File Upload via URI FormatGHSA-x4qj-2f4q-r4rx published
Nov 5, 2025 bymtrezzaHigh - Data schema exposed via GraphQL API public introspectionGHSA-48q3-prgv-gm4w published
Jul 10, 2025 bymtrezzaModerate - Custom object ID allows to acquire role privilegesGHSA-8xq9-g7ch-35hg published
Oct 4, 2024 bymtrezzaCritical - ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass VulnerabilityGHSA-c2hr-cqg6-8j6r published
Jun 30, 2024 bymtrezzaCritical - Server crash when uploading file without extensionGHSA-792q-q67h-w579 published
Oct 20, 2023 bymtrezzaHigh - Parse Pointer allows to access internal Parse Server classes and circumvent `beforeFind` query triggerGHSA-fcv6-fg5r-jm9q published
Sep 4, 2023 bymtrezzaHigh